12
Cyber Crime Reasons and Results Lang Liu u3042475

Cyber crime reasons and results

  • Upload
    langliu

  • View
    1.892

  • Download
    1

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Cyber crime reasons and results

Cyber Crime Reasonsand Results

Lang Liu u3042475

Page 2: Cyber crime reasons and results

I can learn how to open people’s email, find something privacy and interesting.

And no one will know what u did it to them!

Steel privacy information for fun at first

Page 3: Cyber crime reasons and results

People realize their email has been log on by anther

Page 4: Cyber crime reasons and results

Simple internet users become professional hacker

It is so easy to learn how to become a hacker online, then I can work for my own benefits. Hahaha...

Page 5: Cyber crime reasons and results

Start to get personal account information base on curiosity

Try to get money from the account I hacked, that’s a good idea!

Page 6: Cyber crime reasons and results

Internet surfers get to know hacker is major threat to their benefits

Call the internet police for help, I feel safety now.

Page 7: Cyber crime reasons and results

A normal users become a real hacker to steel money and won’t stop

Earning money is so easy from steel

accounts, and I won’t get caught because no

one can find me.

$$$$$......

Page 8: Cyber crime reasons and results

Internet police get involved

Page 9: Cyber crime reasons and results

Hacker will be caught by police

Page 10: Cyber crime reasons and results

Protect yourself when surfing online, get a steady antivirus program, and don’t be a

hacker!

Page 11: Cyber crime reasons and results

Discussions

• Why hacker is illegal?• How does the internet police and antivirus

protect surfers?• What can surfers do for protecting their

selves?

Page 12: Cyber crime reasons and results

References• http://www.webopedia.com/TERM/C/cyber_crime.html• http://www.google.com.au/imgres?imgurl=http://www.doit.wisc.edu/

news/images/oct09/comp-security.jpeg&imgrefurl=http://www.doit.wisc.edu/news/story.asp%3Ffilename%3D1239&usg=__DLL3JixuDHI9N1u6ksve2J9fSAs=&h=598&w=612&sz=41&hl=zh-CN&start=34&zoom=1&itbs=1&tbnid=CDCPCtQCV48FtM:&tbnh=133&tbnw=136&prev=/images%3Fq%3Dhacker%2527s%2Bends%26start%3D20%26hl%3Dzh-CN%26sa%3DN%26gbv%3D2%26ndsp%3D20%26tbs%3Disch:1

• http://www.google.com.au/imgres?imgurl=http://letsrealize.files.wordpress.com/2010/09/cybercrime-freakingnewscom.jpg&imgrefurl=http://www.letsrealize.wordpress.com/&usg=__nBe169wkEdaMoB9S0c-Yx9Glhtg=&h=907&w=936&sz=239&hl=zh-CN&start=19&zoom=1&um=1&itbs=1&tbnid=Vupwv5cxuvgKnM:&tbnh=143&tbnw=148&prev=/images%3Fq%3Dcyber%2Bcrime%2Breasons%26um%3D1%26hl%3Dzh-CN%26tbs%3Disch:1